Which of the following is the HIPs executable for the McAfee Validation Trust Protection service?
Which of the following is the HIPs executable for the McAfee Validation Trust Protection
service?
Which of the following statements best defines the Application Protection (Shielding and Enveloping) feature?
Which of the following statements best defines the Application Protection (Shielding and
Enveloping) feature?
What McAfee proprietary protocol is used for secure communication between the McAfee Agent and server?
What McAfee proprietary protocol is used for secure communication between the McAfee
Agent and server?
Which of the following methods utilize HIPs events?
Which of the following methods utilize HIPs events? (Select the three that apply)
Which component controls the scheduled tasks and communicates with the common agent1?
Which component controls the scheduled tasks and communicates with the common
agent1?
Which of the following is the HIPs policy that allows a generated listing of applications that are known to be
Which of the following is the HIPs policy that allows a generated listing of applications that
are known to be safe and are allowed to perform any normal operation?
Which of the following HIPs features provides the ability to reuse common policy components, particularly Fire
Which of the following HIPs features provides the ability to reuse common policy
components, particularly Firewall groups and rules?
Which of the following extensions is required to enable IPS within HIPs?
Which of the following extensions is required to enable IPS within HIPs?
Which of the following methods are used for Application Blocking?
Which of the following methods are used for Application Blocking? (Select the two that
apply)
Which of the following databases are not support in HIPs?
Which of the following databases are not support in HIPs?